Skip to main content

Showing 1–7 of 7 results for author: Vogel, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.01465  [pdf, ps, other

    cs.CR

    A new efficient RPKI Design

    Authors: Haya Schulmann, Niklas Vogel

    Abstract: Resource Public Key Infrastructure (RPKI) is a critical security mechanism for BGP, but the complexity of its architecture is a growing concern as its adoption scales. Current RPKI design heavily reuses legacy PKI components, such as X.509 EE-certificates, ASN.1 encoding, and XML-based repository protocols, all these introduce excessive cryptographic validation, redundant metadata, and inefficienc… ▽ More

    Submitted 2 July, 2025; originally announced July 2025.

  2. Poster: From Fort to Foe: The Threat of RCE in RPKI

    Authors: Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: In this work, we present a novel severe buffer-overflow vulnerability in the RPKI validator Fort, that allows an attacker to achieve Remote Code Execution (RCE) on the machine running the software. We discuss the unique impact of this RCE on networks that use RPKI, illustrating that RCE vulnerabilities are especially severe in the context of RPKI. The design of RPKI makes RCE easy to exploit on a… ▽ More

    Submitted 25 November, 2024; originally announced November 2024.

    Comments: In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24), October 14-18, 2024, Salt Lake City, UT, USA. ACM, New York, NY, USA, 3 pages

  3. arXiv:2409.14518  [pdf, other

    cs.CR

    RPKI: Not Perfect But Good Enough

    Authors: Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: The Resource Public Key Infrastructure (RPKI) protocol was standardized to add cryptographic security to Internet routing. With over 50% of Internet resources protected with RPKI today, the protocol already impacts significant parts of Internet traffic. In addition to its growing adoption, there is also increasing political interest in RPKI. The White House indicated in its Roadmap to Enhance Inte… ▽ More

    Submitted 22 September, 2024; originally announced September 2024.

  4. arXiv:2406.03133  [pdf, other

    cs.CR

    The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC

    Authors: Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: Availability is a major concern in the design of DNSSEC. To ensure availability, DNSSEC follows Postel's Law [RFC1123]: "Be liberal in what you accept, and conservative in what you send." Hence, nameservers should send not just one matching key for a record set, but all the relevant cryptographic material, e.g., all the keys for all the ciphers that they support and all the corresponding signature… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: Accepted to ACM CCS 2024

  5. arXiv:2403.15233  [pdf, other

    cs.CR

    Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU

    Authors: Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: NSEC3 is a proof of non-existence in DNSSEC, which provides an authenticated assertion that a queried resource does not exist in the target domain. NSEC3 consists of alphabetically sorted hashed names before and after the queried hostname. To make dictionary attacks harder, the hash function can be applied in multiple iterations, which however also increases the load on the DNS resolver during the… ▽ More

    Submitted 17 June, 2024; v1 submitted 22 March, 2024; originally announced March 2024.

    Comments: 13 pages, 7 figures for the associated zonefile generator implementation, see https://github.com/Goethe-Universitat-cybersecurity/NSEC3-Encloser-Attack submitted to USENIX WOOT '24

  6. arXiv:2312.01872  [pdf, other

    cs.CR

    The CURE To Vulnerabilities in RPKI Validation

    Authors: Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: Over recent years, the Resource Public Key Infrastructure (RPKI) has seen increasing adoption, with now 37.8% of the major networks filtering bogus BGP routes. Systems interact with the RPKI over Relying Party (RP) implementations that fetch RPKI objects and feed BGP routers with the validated prefix-ownership data. Consequently, any vulnerabilities or flaws within the RP software can substantiall… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: Accepted for publication in NDSS '24

  7. arXiv:2303.11772  [pdf, other

    cs.NI cs.CR

    Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet

    Authors: Tomas Hlavacek, Haya Shulman, Niklas Vogel, Michael Waidner

    Abstract: IP prefix hijacks allow adversaries to redirect and intercept traffic, posing a threat to the stability and security of the Internet. To prevent prefix hijacks, networks should deploy RPKI and filter bogus BGP announcements with invalid routes. In this work we evaluate the impact of RPKI deployments on the security and resilience of the Internet. We aim to understand which networks filter invali… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: Accepted for USENIX Security '23